Abstract is missing.
- Exploring the Use of Control Packets in LoRa Medium Access: A Scalability AnalysisRui Fernandes, Rui Oliveira, Miguel Luís, Susana Sargento. 1-7 [doi]
- Lightweight Timeslot Scheduling Through Periodicity Detection for Increased Scalability of LoRaWANJoseph Finnegan, Ronan Farrell, Stephen Brown 0001. 8-15 [doi]
- How to Make Firmware Updates over LoRaWAN PossibleKhaled Q. Abdelfadeel, Tom Farrell, David McDonald, Dirk Pesch. 16-25 [doi]
- Short: Achieving Energy Efficiency in Dense LoRaWANs through TDMALaurent Chasserat, Nicola Accettura, Pascal Berthou. 26-29 [doi]
- Identifying Highly Influential Travellers for Spreading Disease on a Public Transport SystemAhmad El Shoghri, Jessica Liebig, Raja Jurdak, Lauren Gardner, Salil S. Kanhere. 30-39 [doi]
- Data Storage and Sharing for Mobile Devices in Multi-region Edge NetworksJoão A. Silva, Pedro Vieira, Hervé Paulino. 40-49 [doi]
- A Walk Down Memory Lane: On Storage Capacity in Opportunistic Content Sharing SystemsGianluca Rizzo, Noelia Perez Palma, Marco Ajmone Marsan, Vincenzo Mancuso. 50-59 [doi]
- MaxDelivery: A New Approach to a DTN Buffer ManagementCorina-Stefania Nanau. 60-61 [doi]
- Security Issues in Distributed Storage NetworksStanislav Kruglik. 62-63 [doi]
- An Approach for Optimal Base Station Selection in 5G HetNets for Smart FactoriesMuhammad Farhan Khan. 64-65 [doi]
- Implementation of Tokenised Supply Chain Using Blockchain TechnologyYash Madhwal. 66-67 [doi]
- Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH NetworksGioele Carignani, Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi. 68-77 [doi]
- DETECTIF : Unified Detection & Correction of IoT Faults in Smart HomesMadhumita Mallick, Archan Misra, Niloy Ganguly, Youngki Lee. 78-87 [doi]
- Towards Learning-automation IoT Attack Detection through Reinforcement LearningTianbo Gu, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu 0001, Prasant Mohapatra. 88-97 [doi]
- HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave CommunicationsLuis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim. 98-107 [doi]
- Dynamic Cell-Less Radio Access Network Meta-Scheduler for High System Capacity IncreaseChristopher Merlhe, Cédric Gueguen. 108-116 [doi]
- CTC-CEM: Low-Latency Cross-Technology Channel Establishment with Multiple NodesVerónica Toro-Betancur, Suzan Bayhan, Piotr Gawlowicz, Mario Di Francesco. 117-126 [doi]
- Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave NetworksGek Hong Sim, Mahdi Mousavi, Lin Wang, Anja Klein 0002, Matthias Hollick. 127-136 [doi]
- Edge-Assisted Resource Management for Data-Centric IoT Applications in Shared Sensor NetworksSimone Bolettieri, Raffaele Bruno. 137-146 [doi]
- Smart Contract-based Hierarchical Auction Mechanism for Edge Computing in Blockchain-empowered IoTHui Lin, Zetao Yang, Zicong Hong, Shenghui Li, Wuhui Chen. 147-156 [doi]
- Dynamic Scheduling for IoT Analytics at the EdgeApostolos Galanopoulos, Víctor Valls, Douglas J. Leith, George Iosifidis. 157-166 [doi]
- Eye Movements as a Key in Cognitive Authentication ProtocolsMarek R. Ogiela, Lidia Ogiela. 167-169 [doi]
- A Reinforcement Learning Approach for Base Station On/Off Switching in Heterogeneous M-MIMO NetworksMarcin Hoffmann, Adrian Kliks, Pawel Kryszkiewicz, Georgios P. Koudouridis. 170-172 [doi]
- Reliability Assessment of Bio-Inspired Ultra-Dense Networks Using Percolation TheoryLukasz Kulacz, Adrian Kliks. 173-175 [doi]
- Application of Virtual Leaders in Long Vehicle Platoons Operating with Cooperative Adaptive Cruise Control Using IEEE 802.11p TransmissionKarolina Lenarska, Krzysztof Wesolowski, Michal Sybis. 176-178 [doi]
- Power Consumption Variation for a Single Technology Wireless TransceiversPawel Kryszkiewicz, Adrian Kliks, Lukasz Kulacz, Bartosz Bossy. 179-181 [doi]
- A Testbed for Time-Slotted LoRa CommunicationsDimitrios Zorbas. 182-184 [doi]
- Godash 2.0 - The Next Evolution of HAS EvaluationJohn O'Sullivan, Darijo Raca, Jason J. Quinlan. 185-187 [doi]
- Supply-Chain Management System for Plastic Pipes Market Based on Open Blockchain FrameworkSergey Kudryashov, Stanislav Kruglik, Ivan Maslov, Yury Yanovich. 188-190 [doi]
- A QoE and Visual Attention Evaluation on the Influence of Audio in 360° VideosAmit Hirway, Yuansong Qiao, Niall Murray. 191-193 [doi]
- Enabling Human-Robot-Interaction for Remote Robotic Operation via Augmented RealityChung Xue, Yuansong Qiao, Niall Murray. 194-196 [doi]
- A Statistical Characterization of SINR Coverage and Network Throughput with Macro-DiversityYatin Sharma, Gourab Ghatak. 197-204 [doi]
- Network Calculus Based Delay Analysis for Mixed Fronthaul and Backhaul 5G NetworksAbin Mathew, Manikantan Srinivasan, C. Siva Ram Murthy. 205-214 [doi]
- Event-Based Vision: Understanding Network Traffic CharacteristicsGiulia Attanasio, Claudio Fiandrino, Joerg Widmer. 215-223 [doi]
- Middle-mile Network Optimization in Rural Wireless MeshesYung-fu Chen, Anish Arora. 224-233 [doi]
- DeepNDN: Opportunistic Data Replication and Caching in Support of Vehicular Named DataGaetano Manzo, Eirini Kalogeiton, Antonio Di Maio, Torsten Braun, Maria Rita Palattella, Ion Turcanu, Ridha Soua, Gianluca Rizzo. 234-243 [doi]
- User-centric Optimization of Caching and Recommendations in Edge Cache NetworksDimitra Tsigkari, Thrasyvoulos Spyropoulos. 244-253 [doi]
- Achieving Optimal Cache Utility in Constrained Wireless Networks through Federated LearningShanti Chilukuri, Dirk Pesch. 254-263 [doi]
- Trilateration, Fingerprinting, and Centroid: Taking Indoor Positioning with Bluetooth LE to the WildTim Kluge, Christin Groba, Thomas Springer. 264-272 [doi]
- Short: LSTM-based GNSS Spoofing Detection Using Low-cost Spectrum SensorsRoberto Calvo-Palomino, Arani Bhattacharya, Gérôme Bovet, Domenico Giustiniano. 273-276 [doi]
- Lightweight and Standalone IoT Based WiFi Sensing for Active Repositioning and MobilitySteven M. Hernandez, Eyuphan Bulut. 277-286 [doi]
- Collective Subscriptions: A Novel Funding Tool for Crowdsourced Network InfrastructuresMerkouris Karaliopoulos, Iordanis Koutsopoulos. 287-296 [doi]
- Punched Cards over the Air: Cross-Technology Communication Between LTE-U/LAA and WiFiPiotr Gawlowicz, Anatolij Zubow, Suzan Bayhan, Adam Wolisz. 297-306 [doi]
- MAMBA: Adaptive and Bi-directional Data Transfer for Reliable Camera-display CommunicationJacopo Bufalino, Maria L. Montoya Freire, Juho Kannala, Mario Di Francesco. 307-316 [doi]
- Inventory Management through Mini-Drones: Architecture and Proof-of-Concept ImplementationDavide Cristiani, Filippo Bottonelli, Angelo Trotta, Marco Di Felice. 317-322 [doi]
- SDN-(UAV)ISE: Applying Software Defined Networking to Wireless Sensor Networks with Data MulesJ. S. Mertens, G. M. Milotta, P. Nagaradjane, Giacomo Morabito. 323-328 [doi]
- SkyCell: A Prototyping Platform for 5G Aerial Base StationsLudovico Ferranti, Leonardo Bonati, Salvatore D'Oro, Tommaso Melodia. 329-334 [doi]
- Wildfire Spread Modeling with Aerial Image ProcessingQiyuan Huang, Abolfazl Razi, Fatemeh Afghah, Peter Fule. 335-340 [doi]
- Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security DefensesRobert E. Gillen, Laura Ann Anderson, Christopher Craig, Jordan Johnson, Adam Columbia, Rachel Anderson, Andrew Craig, Stephen L. Scott. 341-346 [doi]
- Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix ProfilesSimon D. Duque Antón, Hans D. Schotten. 347-353 [doi]
- An Edge-Fog Computing Framework for Cloud of Things in Vehicle to Grid EnvironmentNeeraj Kumar 0001, Tanya Dhand, Anish Jindal, Gagangeet Singh Aujla, Haotong Cao, Longxiang Yang. 354-359 [doi]
- Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control SystemsRobert E. Gillen, Jason M. Carter, Christopher Craig, Jordan A. Johnson, Stephen L. Scott. 360-366 [doi]
- Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and CooperationJörg Christian Kirchhof, Martin Serror, René Glebke, Klaus Wehrle. 367-372 [doi]
- Starvation-avoidance CAN Scheduling for Shorter Worst-case Response Time with Priority QueuesHaklin Kimm, Jeyaprakash Chelladurai. 373-378 [doi]
- SCADA-agnostic Power Modelling for Distributed Renewable Energy SourcesAhlam Althobaiti, Anish Jindal, Angelos K. Marnerides. 379-384 [doi]
- Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy TradingFaizan Safdar Ali, Moayad Aloqaily, Öznur Özkasap, Ouns Bouachir. 385-390 [doi]
- DDoSNet: A Deep-Learning Model for Detecting Network AttacksMahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut. 391-396 [doi]
- A Big Data Fusion to Profile CPS Security Threats Against Operational TechnologyKarl Biron, Wael Bazzaza, Khalid Yaqoob, Amjad Gawanmeh, Claude Fachkha. 397-402 [doi]
- Performance Analysis of an IoT Platform with Virtual Reality and Social Media IntegrationAbhilash Krishnan, Anderson Augusto Simiscuka, Gabriel-Miro Muntean. 403-408 [doi]
- BLUES: A Self-organizing BLE Mesh-network Paradigm for IoT EnvironmentsEmanuele Giacomini, Francesco D'Alterio, Andrea Lacava, Francesca Cuomo. 409-414 [doi]
- Topology Awareness for Smart 5G eMBB Network Slicing VNF PlacementIgnacio Sanchez-Navarro, Jose M. Alcaraz Calero, Qi Wang 0001. 415-420 [doi]
- A Node Probability-based Reinforcement Learning Framework for Virtual Network EmbeddingPeiying Zhang, Chao Wang, Gagangeet Singh Aujla, Xue Pang. 421-426 [doi]
- Towards the Mobility Issues of 5G-NOMA Through User Dissociation and Re-association ControlMuhammad Kamran Naeem, Raouf Abozariba, Md. Asaduzzaman, Mohammad N. Patwary. 427-432 [doi]
- A Novel and Secure Service Function Chains Embedding Framework for NFV-Enabled NetworksHaotong Cao, Yue Hu, Shengchen Wu, Longxiang Yang. 433-438 [doi]
- RFC 6550: On Minimizing the Control Plane Traffic of RPL-based Industrial NetworksDimitrios Sourailidis, Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos, Dominique Barthel, Nicolas Montavont. 439-444 [doi]
- Improving Delay and Capacity of TS-LoRa with Flexible Guard TimesDimitrios Zorbas. 445-450 [doi]